April 08, 2016

Opportunities and Risks in 5 Global Outsourcing Locations

The Indian government launched Digital India in 2015 to transform the nation into a digitally empowered society and knowledge economy. The initiative aims to integrate government departments and the people of India by making government services available electronically.
Featured Resource The initiative also includes connecting rural areas with high-speed Internet networks. This initiative has three core components, i.e., creating digital infrastructure, delivering services digitally, and increasing digital literacy. Each of these components can potentially create several opportunities for the global services industry, across India-based and multinationals firms. Digital India offers four key opportunity areas for companies:


Banks finally welcome cloud computing cover

“One of the big challenges is the capital risk models that must be maintained according to regulatory demands. Banking CIOs must make that part of the opex rather than the capex,” an international banking CIO says of the increasing regulatory demands placed on banks which has created a demand for cloud technology in the sector. Regulatory demands don’t show many signs of a let-up, though Sir John Vickers, who was appointed to head the Independent Commission on Banking inquest, recently accused the Bank of England of being too light on the financial services industry. Though there have been numerous extensions to the Basel III accord, its BCBS 2329 regulates the principles of data aggregation. This means CIOs and their organisations have a responsibility to be accountable for the data they hold and who the data owners are.


CIOs lack faith in IT’s ability to meet digital demands of business

Many lack faith in the ability of the IT underpinning their organisation to support such a speedy product release cycle, with 68% raising concerns about the pressure this will put on their existing infrastructure and staff. This, in turn, could have dire consequences for the customer satisfaction they can deliver, and their brand reputation, according to 69% of respondents. Nigel Moulton, CTO for EMEA at VCE, told Computer Weekly that the survey highlight a difference in opinion between the IT department and the wider business about IT’s abilities. “When we looked at the CIO and the estimation of their IT organisation, they tended to be more critical of its capabilities than the business leaders were,” he said.


Red Hat's open source success story built on killing complexity in IT

What used to be a matter of "helping [customers] carve out costs" has become a matter of "building new architectures." I don't personally feel OpenStack has the same resonance as things like Docker, though Red Hat begs to differ, but the general point is correct: Open source increasingly drives innovation, and as more developers pile into open source, the complexity quotient keeps rising. ... The challenge for any would-be open source vendor is two-fold: First, they need to stop trying to exclusively sell whatever project they first developed. Second, they need to stop selling software and instead sell subscription services around the software they corral. This sounds simple, but in practice virtually no open source company follows both of these principles.


Organizations Confirm Big Time Need for Real-time Data

In the midst of all the technology innovation, data scientists and architects still suffer similar challenges of the past. Slow data loading is perhaps one of the most prevalent. With increasing volumes, it simply becomes harder to ingest and store new data. Legacy data architectures based on disk drives or single server systems simply cannot meet today’s performance needs. Slow queries also pose a challenge for similar reasons that disk-oriented and single node systems quickly reach a limit on performance. The lack of concurrency, otherwise known as multi-tasking, further inhibits what older systems can handle. Ideally you have fewer data systems that can handle more types of workloads and models to simplify infrastructure and reduce costs.


Restaurant waitlisting app NoWait rolls out mobile payments

Now that the company has established a large enough business customer base and consumer user base, it’s been expanding what’s possible on its platform. For example, it more recently rolled out a way for diners to privately rate their experience and for restaurants to respond, instead of turning to Yelp. With mobile payments, NoWait is looking to close the loop between the restaurant and consumer, explains CEO Ware Sykes. The company has already been testing payments in its hometown of Pittsburgh, and early results are promising, the CEO claims. “Restaurants are seeing faster table turns, servers are seeing substantially higher tips, and consumers save five to ten minutes at the end of the meal,” he says.


Hybrid cloud: The smart person's guide

In optimal deployments, hybrid cloud provides the best of both worlds of computing. Public cloud providers offer the ability to instantly provision computing resources on demand, without the extensive upfront costs and time needed to build on-premises solutions. The private cloud component delivers information quickly, and does not rely on internet connectivity to operate — an important consideration as ISPs consolidate, and struggle to provide service. Having a private cloud component provides peace of mind; with an on-premises server, a disruption to internet connectivity will not bring your business to a complete standstill. Cost is a substantial factor for many organizations. For industries with seasonal or variable workloads, assembling a private cloud to handle normal workloads while relying on public cloud providers to handle burst workloads can be a budget-friendly IT strategy.


How To Handle A Zero-Day Attack - From Lawyers

When it comes to analyzing or even manipulating the data, try to avoid using any custom code. It’s going to be much easier for all concerned if you use products and methods that can be easily reproduced, even if a clever AWK script with some APL matrices would be more elegant. Any settings and parameters for the apps and databases used in your analysis should be recorded in your journal entries, and use screenshots liberally to substantiate the details.  Of course, anyone with an interest in the outcome of the case should not be analyzing, let alone manipulating, data. Typically, this means consultants should be doing all the data crunching. Make sure that the consultant has no investments in your company or the opposing party, and that your contract with them contains no incentives or bonus payments for specific outcomes.


Dealing with digital disruption in Africa

“No African company can afford to face these kinds of changes without having some kind of digital strategy,” Southwood said. “But this kind of strategy is to some large extent going to be reactive whereas the smarter corporations will begin to make innovation a core part of their business so that they help disruptive start-ups launch and invest in them so that they know how to shape their businesses in the future.” Regulations could also pose a challenge to disruption. Southwood gave the example of mobile money in Kenya and Nigeria. In Kenya, mobile money was allowed to operate until the regulatory bodies understood its implications. “But by the time Nigeria drew up its m-money regulatory framework, it insisted that the banks - not the mobile operators - were formally responsible for offering the services. If disruption threatens powerful players in the economy,


0 Bugs Policy

Bugs that were opened during the development of a new feature. If you are working in Scrum for example (or any other agile iterative methodology), these are the “in sprint” bugs that were found for the new user story you are currently implementing. These kinds of bugs must be fixed right away, otherwise the story/feature is not really DONE, and you are violating a basic agile rule saying that: DONE is DONE is DONE; which means, the story/feature is really completed, only after it was fully tested and approved by the product owner. No loose ends. If this concept is not crystal clear, than we need to go back for agile basics, but that is another article…


Could the Internet of Things morph into the Abandonment of Things?

As developers, we understand that even the simplest of IoT products represents a significant investment. They contain embedded software to make the thing work, server side applications to process messages or send out alerts, databases for maintaining user accounts, iOS and Android mobile apps for controlling devices from your reclining chair, and more. There are license fees for software libraries, too. I can understand the underlying economic reason for leaving the past behind, but in this connected age, before you arbitrarily put a bullet through your products and applications, you’d best provide a soft landing for the people who paid for the privilege of using them.



Quote for the day:


"To improve is to change, so to be perfect is to have changed often." -- Winston Churchill,


April 07, 2016

How New Technology Trends Disrupt the Very Nature of Business

In the Museum of the Future, you can see what it would be like to be going to a doctor to get a new body part to jump higher or move faster. You look at these types of ideas, and the business embraces the same sort of idea. How can I augment my business to actually run smarter and be better? What are things on which I can augment myself to use data better? You can no longer be an island as a company. You need to share ideas and innovation with others. You need to be connected, and when you're connected, you can transform your business, you can do new things, you can take on new capabilities, and you can augment your business.


Are CISOs Building Effective Business Cases for Data Security Investment?

CISOs will have to redesign this undemanding path toward an approach for making business cases in terms executives can appreciate and directly connect to the organization’s top strategy goals and objectives. Making more effective business cases can help to gain investment dollars and increased control for a budget not always under a CISO’s direct management. Security investment decisions are only as good as the business case process. The first step in this process is to define the security initiative well enough so that decision makers can make informed choices. ... In short, they drive results, and not just promise them, because they’re used to ensure the project and the benefits are delivered.


Time to separate the fintech fictions from the fintech facts

It’s an exciting time to be in the fintech landscape. People love to talk about fintech as the next big thing, and as time goes on we’ll have more and more examples of fintech companies hitting it big. With this excitement though, there has been some misinformation and fear shared in the community and among observers. It’s understandable; fintech as a sector is new, and in some ways untested, but people understand the possible gains to be made by innovating the financial services industry. Fintech is a force, and we’re only just beginning to feel its effects. What’s needed is a definitive way to separate the fintech fictions from the facts.


IoT will shake up world of data analytics, says report

“The view has been that IoT is a mashup of complex technologies used only by early adopters,” said Mike Lanman, Verizon senior vice-president of IoT and enterprise products at Verizon. “In the past year, we’ve seen compelling examples of how the IoT is being deployed by a wide-range of enterprises, entrepreneurs, municipalities and developers to address relevant business, consumer and public needs. “Meanwhile, consumers are more willing to try new technologies and apps that introduce a better way of life. The end result will not only give rise to thousands of new use cases over the next two years, but will also create an accelerated pipeline for innovation and a new economy.”



7 Wall Street Firms Test Blockchain for Credit Default Swaps

The companies did not disclose which blockchain or ledger systems were used as part of the trial, though only a few firms currently offer support for smart contracts, with Symbiont and Ethereum being perhaps the most notable. According to the statement, the test showed that regulators could view in "real time" a wide range of financial events including trade details, counterparty risk metrics, and exposure to reference entities. “Our experiments with Axoni demonstrate that confidentiality and privacy can be preserved between bilateral parties on an immutable distributed ledger at scale," said Emmanuel Aidoo, who is in charge of the blockchain and distributed ledgers at Credit Suisse, in a statement. Over the course of the months-long project, the group said it built its network using Axoni-hosted software that was installed locally.


Your car's computers might soon get malware protection

Modern cars contain tens of specialized computers that control everything from infotainment functions to steering and brakes. The pressing need to protect these computers from hackers will likely open up a new market for car-related software security products. Karamba Security, a start-up based in Ann Arbor, Michigan, is one of the companies that has stepped up to answer this demand. The company's anti-malware technology, unveiled Thursday, is designed to protect externally accessible electronic control units (ECUs) found in connected cars. These controllers, like those that handle handle telematics, infotainment and on-board diagnostics, can be accessed via Wi-Fi, Bluetooth or even the Internet, so they can serve as entry points for hackers into a car's network.


Veriflow promises to bulletproof networks

Veriflow believes its mathematical approach across a network-wide infrastructure, solves the above problems and also results in zero change-induced outage and breaches. Unlike techniques such as penetration testing and traffic analysis, Veriflow performs mathematical analysis of an entire network's state, and does so proactively – before vulnerabilities can be identified and exploited, and without waiting for users to experience outages. If there is a network policy violation, Veriflow will find it and provide a precise identification of the vulnerability and how to fix the flaw. Otherwise, Veriflow can provide mathematical proof that the network is correct, giving enterprises the confidence to change their infrastructure.


Cyber Insurance Coverage Gaps May Surprise Many Organizations

Even after providers assess whether they are buying enough coverage and can financially handle additional costs once sublimits are reached, providers must look closely at the definitions contained in the policies. “The real issue in cyber coverage is definitions of certain terms, which could exclude coverage,” Hite says. Coverage goes into effect on the day it was bought, but in instances where a hacker already has infiltrated information systems before a policy was purchased, there is no coverage because policies often don’t work retroactively. Hite advises buying a “retroactive date” policy that covers the organization back at least one year. Organizations with the financial and technical means should have a strong response team in place with everyone knowing what their duties are if an attack comes.


Face it: Developers are becoming babies

It's perhaps not surprising that the developer population keeps getting younger, at least as measured by experience. For example, while the early open source community largely focused on rewriting legacy, proprietary software as open source (Linux replacing Unix, OpenOffice replacing Microsoft Office, etc.), today's open source community is building the future. ...  Developers, focused on their code, can't be bothered to write good documentation which, in turn, hampers adoption. Brian Rinaldi venturedto call the situation a "mess," one that keeps getting worse as more developers jump into code without recognizing that good documentation is an essential feature of the best open source projects (and always has been).


A (new) discipline: The (new) security engineer

This discipline is security in pursuit of designing, architecting, developing and deploying secure products; this is not your father's "security engineer," the one responsible for setting up firewalls and ensuring the VPN was running. While the latter is still an incredibly important role, this new role is about building secure products, rather than working with security products. It requires deep knowledge of developer languages and practices, infrastructure architecture, usability design, legal liabilities and contractual language, regulatory standards, tooling, threat landscapes and hacker trends, supply chain management, and corporate governance. It begs for a passionate evangelist who can dig into dry and dusty regulatory documents, someone cynical enough to expect to be hacked at any time who can also be an enthusiastic and patient mentor ...



Quote for the day:



"Cyber is the one area where we have pure competitors who have the capabilities that we do." --  Adm. Michael Rogers


April 06, 2016

How secure is your boardroom data?

So cyber security is not just a concern for the CIO and their team – it’s something that everyone at board level needs to be aware of. In its 2015 whitepaper, ‘10 Steps: A Board Level Responsibility’, the UK government warned that security was now a board level responsibility, and offered help for senior executives on how to keep sensitive data safe. This has to include both an increased level of awareness around cyber security – knowing the company’s cyber security policies, ensuring they are functioning and are being enforced as intended, and having an awareness of the type of risks that the company may face.This requires a link from IT to the board to make sure these knowledge gaps are filled, and that board members are kept up to date with latest threats. Perhaps there is a role for a sub-committee that focuses only on the analysis of cyber threats and reports back to the board.


Build Your Own Offshore Development Team - or Not?

There is an historical “garbage in, garbage out” approach to leveraging overseas dev/test talent and cost savings. We throw something to essentially a coding factory on another continent and wonder why it doesn’t come back looking like it was tailor-made. Or we think we’ve secured the services of a hotshot overseas coder and wonder why he leaves us for Microsoft and a work visa six months later. I’ve been on both sides of the outsourced development puzzle—client side and vendor side. Some may be in the unique position to create their own offshore center due to business connections, existing infrastructure, unique cultural background, or a combination of all three. But this is not typical or practical for most of us and here’s why:


How to do data-driven marketing right

Enterprises today accumulate a lot of data, which they typically use internally for CRM, sales forecasting, and marketing strategies, among other things. But some savvy companies, particularly those in the technology industry, share this data with the media and the world at large. The benefits of data-driven content marketing can be considerable. Here's how some companies leverage their own data for marketing, brand awareness, and thought leadership, along with tips and best practices for success.


How to Prepare for a DDoS Attack

Visibility is critical when preparing for issues in your network. SNMP graphing platforms will tell you an extraordinary amount of information on volumetric attacks. You’ll be able to see and (depending on the platform) sometimes even alert on anomalous bandwidth events. You’ll be able to track at which port it entered your network, if it’s saturating any links, and even where the attack is headed. It’s surprising how many companies I’ve worked with over the years that do not deploy this because it’s such an easy and basic thing to implement. Primarily, you need devices that can speak SNMP, such as managed switches, routers, etc., and then you need a platform to query them.


Study: Interest in location intelligence technology nascent but rising

Interest in location intelligence is dependent on the industry. “If you’re doing things like sales operational planning, you have to use location intelligence to do that. Otherwise, you’re not going to understand how to allocate resources appropriately,” he said. Indeed, when broken down by industry, the survey reveals that retail has the highest interest in location intelligence with 65% of those representing the industry indicating that location intelligence is either critically important or very important to their company. Only 40% of survey takers from health care and 35% of survey takers from education said the same. Yet Dresner predicts location intelligence will rise in importance across all industries eventually. One driver is Internet of Things (IoT), he said, pointing to the growing network of Wi-Fi enabled physical objects such as Fitbits and connected vehicles.


Next-Generation Databases Shift IT Priorities

IT professionals do not want their next-generation database solution to require a "media-heavy server architecture," Thakur pointed out. "They want native formats on secure storage." They want a scalable system that can handle ever-increasing data loads, Thakur added. They want resiliency. "Given this highly distributed world, a node could go up or down fairly quickly. Customers want backup infrastructure that is highly available," Thakur said, which is preferable to doing the backup all over again should a node ever quit. But there is a trade-off. IT professionals can either have eventual data consistency on the next-generation platform, or strong consistency, which is the hallmark of the relational database, Thakur explained. "If you want scalability, you have to give up something," he said. IT professionals will give up strong consistency to gain the benefits of scalability that big data has to offer, he added.


Technology, IoT monetization to usher in 'programmable economy'

Over the next few years, Furlonger predicted, there will be a transition to an economic model that will better support organizations' move to digital business. IoT will play a key role in this transition. "The Things will start to act as proxies for us. You see that with things like virtual personal assistants, virtual customer assistants, different algorithms for robots … making decisions on our behalf in the transactional supply chain. That's just the beginning," he said. Furlonger said robotic services -- including those attached to IoT -- will become increasingly autonomous. "There's no reason -- because everything is connected to the Internet -- why they can't access your bank account, why they can't pay tax, why they can't transfer money. It's just another Internet-based connection, and then they become part and parcel of this new economic environment," he said.


The 'IoT' Is Changing the Way We Look at the Global Product Value Chain

The traditional product value chain has been shaken up with the unstoppable spread of globalization and the universal commodification of goods and services. Globalization has forced companies to adjust and respond. In fact, Internet of Things (IoT) products are playing a pivotal role in the alteration of B2C relationships, delivery channels and product pricing, and their continued proliferation is shaping the very nature of how we look at the product value chain. The "Internet of things" refers to objects that can communicate among one other through a network. IoT is becoming prolific and commonplace in everyday objects. And, with experts predicting that the IoT network will consist of some 50 billion devices by 2020, those devices will only become more and more ubiquitous. The IoT revolution is truly just beginning, and it will most certainly will be televised!


Test Management Revisited

While test management is largely irrelevant in this world, there is still a desperate need for test leadership. Why is this? The main reason is that as organisations struggle to become more innovative to respond quickly to market changes, engineering has responded by turning to continuous deployment and cross-functional teams to help meet demand. How testing fits into this picture is proving to be an Achilles heel for many organisations, which struggle to solve the challenge of how to making testing relevant and faster, yet uphold the quality they need to develop trust with their customer base. The truth is, agile or not, most organisations adopt a testing approach constructed not long after the computer came into being—despite the enormous technological advances made in the last 70 years.


Why Banks Should Go Easy On The Blockchain

The banks are certainly getting schooled on the technology, with most of the world’s top FIs participating in some type of blockchain development scheme, if not investing on their own internal programs to explore the tool. FinTech innovators were the first to forge a path that could bring blockchain into the real world, but it wasn’t until financial institutions began investing and taking interest in the sector that it began to be taken seriously. It may not seem fair, but Lawlor said it was necessary. “Any time we’re dealing with people’s money, there’s a need for the legitimacy of a financial institution that’s been around for potentially hundreds of years,” he noted. “They also have the regulatory and compliance structures already in place.”



Quote for the day:


"Don't expect to build up the weak by pulling down the strong." -- Calvin Coolidge


April 04, 2016

5 Security Bad Habits (And Easy Ways to Breal Them)

Procrastination. Fidgeting. Biting your nails. These are all bad habits, but none so bad that they could bring a company to its knees. When it comes to security, however, some bad habits could be devastating, leaving your company vulnerable to hacks, data loss or theft or some similar type of security breach. The good news is that there are some simple steps IT can take to educate users on security best practices and make them part of the solution instead of the problem. Jonathan Crowe, senior content manager at endpoint security solutions company Barkly offers five simple ways to improve your security posture and help employees become a bit more security-savvy.


How Early-Stage Startups Can Enlist The Right Amount of Security As They Grow

Many resource-strapped startups gauge their commitment level to security by assessing the financial expense to the company. Instead, Graham recommends defining security spend by a company’s possible exposure risk. “For all companies, there’s a limit to how much money can be lost. So if you’re spending more than that amount, you’re absolutely screwing up,” says Graham. “There’s also a limit to how much money you’re likely to lose based on what it is you do with customer data and what you do to monetize it. You’re also messing up if you spend more than that amount.” Graham admits that these assertions are counter to many marketing messages. Most startups are exposing customers to more risk than they’re selling. “There’s a lot of social capital used in marketing these days. Statements such as: ‘You can absolutely trust us to take care of your data.’


The inevitability of data visualization criticism

On a recent episode of What's the Point, Giorgia Lupi expressed this perfectly when she said, "Beauty is a very important entry point for readers to get interested about the visualization and be willing to explore more. Beauty cannot replace functionality but beauty and functionality together achieve more. Beauty is an asset." This doesn't mean you should never produce a line chart, but would the WSJarticle have been so successful had they done it Randy's way? Randy acknowledges this in his article. We both agree you need to craft accurate charts and focus on the story. A rich dataset can tell many stories. In this case, even when you have chosen the story you want to choose ("vaccinations end disease"), it can be told in many different ways (line chart or highlight table).


How an AI program helps doctors identify cancer and other medical abnormalities

Behold.ai's system works by looking at images and giving doctors suggestions, based on learning from similar medical scans. "Computers have become increasingly adept at figuring out objects and images," said Raut. "There's the Amazon Fire phone, which can scan a picture and if it's a product on Amazon, it will find it for you." And Facebook, he said, can see a photo and tell who that person is. "There's a lot of advances in facial recognition that we wanted to adapt to medicine," he said, "because it's about determining where the nodules, aneurysms, and things like that are." Through partnerships with hospitals, Behold.ai is using data sets from real patients to ensure that the reinforcement learning system has quality data


Outshone by Smaller Screens, PCs Aim to Be Seen as Cool Again

Yet as people increasingly gravitate to smartphones and tablets for their computing needs, shifting into what has been called the “post-PC era,” the investment into design and new innovations by PC makers may come to naught. Last year, 289 million PCs were sold worldwide, an 8 percent drop from 2014, according to Gartner, a research firm. The sales decline was just the latest in several years when the PC market faced an onslaught of smartphones and tablets as cooler alternatives. The falloff is expected to level off this year, with PC sales even expected to begin growing slowly in 2017. But that still leaves the question of whether PCs can seem cool again. Even people who depend on the PC industry now lack passion for these onetime miracle products.


Microsoft Embraces Linux - Way Too Late

The Linux-on-Windows announcement is more interesting, but requires some clarification. This is not Linux running in a VM -- there's no Linux kernel present, nor a hypervisor emulating hardware. This isn’t Cygwin, which is a Unix environment compiled specifically to run on the Windows platform. It’s not a container, either. The Ubuntu environment running on Windows 10 contains binaries identical to the binaries running on an Ubuntu platform -- an ELF executable. What Microsoft has done is build a system call translation layer. When a Linux binary makes a syscall, Microsoft’s Windows Subsystem for Linux translates it into a Windows syscall and delivers what the binary expects. It’s akin to WINE, which does something similar for Windows binaries running on Linux. Also like WINE, it’s not magic -- many binaries won’t "just work." This is only the beginning of a long process for Microsoft.


C#/Web API Code Generation Patterns for the RAML User

C# 2.0 was designed with code generation in mind. Seeing how common it was to use code generators even in Visual Studio itself, it was given the ability to create partial classes. A partial class contains some, but not necessarily all, of the code that makes up the whole class. This allows you to separate the class over multiple files, some of which are code-generated while others are hand-written. This separation prevents the code generator from wiping out code the developer has manually written. Unfortunately, this wasn’t enough. Partial classes allow you to add new methods, but not change the behavior of existing ones. For that we had to wait until 2008 and the introduction of partial methods in C# 3. Superficially, a partial method looks like an abstract method, but this is the wrong analogy.


MedStar hack shows risks that come with electronic health records

Health care executives and regulators say their increasing reliance on computer networks and electronic patient data have brought new challenges. Sharon Boston, a spokeswoman for LifeBridge Health, said the corporation takes information security seriously and works to adapt to new threats as they arise. LifeBridge operates Sinai, Northwest and Carroll hospitals in the Baltimore region. "The use of the electronic medical record across the health care industry is broader and deeper than it has ever been, and will continue to grow," Boston said. "With the evolving nature of these electronic threats, LifeBridge Health continually monitors the safety and potential vulnerability of our information systems and takes appropriate action."


Ever been in these social engineering situations?

Once I picked the lock to the unalarmed external emergency door, I realized that the client took the extra step of implementing biometric access control. There wasn't a single person going in or out while I observed. I needed a different way in to the server room. I noticed a security guard station with several monitors and a key box behind the desk. I saw a guard and a maintenance employee were taking a coffee break. "Sorry guys, I'll just be a moment. I need to get the serial numbers off of these devices. We are doing inventory." I gave him the face of, "you know, the grind," shrugged and began writing down anything I saw. "Not a problem," the guard responded after glancing at my fake badge I made using basic photo editing skills. “You can take them if you want. They don't work half of the time anyway," the guard chuckled.


Microsoft's machine learning vision includes security, too

"We want to build intelligence that augments human abilities and experiences. Ultimately it is not going to be about man versus machine. It is going to be about man with machines," Nadella said at Build. And what's better than having machines help users protect their data and communications? Nadella acknowledged social implications to security and privacy, promising Microsoft will take a “principled approach” as it adds intelligence to applications. Technology needs to be “more inclusive and respectful,” as well as balance security and privacy considerations, such as adopting encryption. Consider the Skype bot. The Build demo showed the bot picking up key terms related to travel during a Skype call and suggesting hotel reservations. The same bot will have to recognize sensitive information and make sure to protect it.



Quote for the day:


"For all companies, there's a limit to how much money can be lost. So if you're spending more than that amount, you're absolutely screwing up." -- Michael Graham


April 03, 2016

How to approach machine learning as a non-technical person

The last and trickiest aspect of assessing ML technology is understanding how improvements on the ML task will impact which business metrics and by how much. Sometimes there’s a very direct relationship. For instance, for ad placement in search results, the ML metric is typically predicting the probability of ad click-through (possibly weighted by expected CPC). The rate and revenue-generated ad click-through is either a core business metric or closely related to one. In this setting, it makes a lot of sense to invest heavily in ML, because gains will likely improve business metrics. In other settings, the relationship is less clear. For instance, at Netflix, improving movie recommendation quality by 0.5 percent, while difficult, does not necessarily mean that month-over-month subscriber retention will necessary budge


The Evolution of Data Storytelling

Beyond being a marketing buzzword, Data Storytelling careerists know what it takes to tell a concise, actionable, data-driven narrative. Classic data mining and knowledge discovery trainingalways starts with identifying the business problem first, identifying clear goals or hypothesis to test, and then iterating through a data modeling process to select the right algorithms to produce recommendations (and then lather, rinse, repeat). As new statistical techniques were introduced and big data challenges emerged, these processes evolved but stayed generally the same. Organizations have since been trying to capture and scale this practice more recently, as evidenced by newly trending roles in the uppermost echelons like Chief Data Analytics Officer. These roles are charged with rolling out a data science team within their organizations, albeit an easier said than done practice.


Deep learning will be huge — and here’s who will dominate it

What’s perhaps most interesting here is that these startups are targeting almost every industry out there. The first layer is general-purpose AI platforms that get fed large amount of data and automatically discover interesting patterns such as Valley-based Ayasdi, Germany-based Blue Yonder, or Israel-based SparkBeyond. Then there are companies that sell AI-based products to enterprises. These include AI-based personalization and marketing tools such as Radius and Dynamic Yield, sales and retention prediction tools such as 6sense and Gainsight, and AI-based customer support company Wise.io. But AI startups don’t stop at the enterprise. They are disrupting many traditional industries such as ground transportation, agriculture, industrial, and healthcare.


When Self-Driving Cars Decide Who Lives and Who Dies

Imagine the following scenario: A family with parents and children is using the self-driving vehicle service within a smart city. All surrounding vehicles are also centrally controlled to better account for minimum risk of traffic accidents. A child runs after a ball across the street in front of the vehicle, transporting the family. This is an external factor to the traffic system and was not planned. The central traffic system now has to follow its primary routines and avoid harm to passengers and surrounding humans as good as possible. A crash is imminent even though a breaking process was started. The vehicle can now only “choose” the best possible option based on data it computes.


Agile and Wrong: The Problems with Emergent Design in Pictures

With emergent design, a development organization starts delivering functionality and lets the design emerge. Development will take a piece of functionality A and implement it using best practices and proper test coverage and then move on to delivering functionality B. Once B is built, or while it is being built, the organization will look at what A and B have in common and refactor out the commonality, allowing the design to emerge. This process continues as the organization continually delivers functionality. At the end of an agile release cycle, development is left with the smallest set of the design needed, as opposed to the design that could have been anticipated in advance.


IoT and the development of a circular economy

Identified as a significant business opportunity, circular economy models have gained increasing momentum over the last five years. Combine the principles of a regenerative and restorative economy, where the utilization and useful life of assets is extended, with IoT technologies, which provide information about the condition, location and availability of those assets, and there may be an even greater opportunity to scale new models more effectively, while providing new direction to the digital revolution. To pose an example, the average European car currently spends 95 percent of the time parked. Large automotive manufacturers, including the likes of GM and Ford, have identified economic advantages to be gained by leasing vehicles through car-sharing models, rather than restricting themselves to a one-time sales model.


The Robots Are Coming: Funding and Spending Doubling

International Data Corporation (IDC) has identified robotics as one of six Innovation Accelerators that will drive digital transformation by opening new revenue streams and changing the way work is performed. In the new Worldwide Commercial Robotics Spending Guide, IDC forecasts global spending on robotics and related services to grow at a compound annual growth rate (CAGR) of 17% from more than $71 billion in 2015 to $135.4 billion in 2019. The new spending guide measures purchases of robotic systems, system hardware, software, robotics-related services, and after-market robotics hardware on a regional level across thirteen key industries and fifty-two use cases. … Not surprisingly, worldwide robotics spending is dominated by the discrete and process manufacturing industries, which represented 33.2% and 30.2% of total spending in 2015, respectively.


Is the blockchain good for security?

"There may be no software that has been better proven, from a security standpoint, than Bitcoin," Bagley said. "Building a stock trading platform atop such well proven software should leave all parties feeling very confident, from a security point of view." In addition, he said, settlement times are reduced from three days to 10 minutes, settlement costs are cut by 80 percent, and counterparty risk is eliminated because the cash and assets are accounted for ahead of time and instantly swapped. Finally, the blockchain is completely transparent, he said, and cannot be changed. "Put transparency and immutability together and you have a dream scenario for regulators, auditors and compliance officers," he said.


Big Data Self-Delusion

“The Human Face of Big Data” demonstrates that giving more people access to the Internet does not automatically include them in “the discussion.” China has more people connected to the Internet than any other country, but there is no one from China among the two dozen “experts” identified by name in the film—all are based in the U.S. No one from Russia, India, Japan, Brazil—countries where one may find talking heads or, even better, data scientists, that may represent a different point of view about the role of technology, the Internet, and big data. It would have enriched this documentary tremendously if we heard their take on the pros and cons of big data, how they define it, what it means to them, and what specific types of data collection and analysis will make a difference in their countries.


Living in the digital economy and loving it

"At the centre of this transformation will be our individual digital identity that we alone curate to allow chosen organisations to interact with us. "Yes, we will give up some privacy but the pay-off will be more convenience. At first, we hesitated to use paywave but now everyone uses it because it saves time and effort. "Having a digital identity will give us freedom from information as well as more control of who we share our information with and what they do with it." Professor Kowalkiewicz said proactive organisations would become trusted partners and an invisible part of our lives. "For example, you are turning 16, the proactive organisation sends you a learners application. Driving instructors and defensive driving course providers will have contacted you. "Banks will analyse your credit card spend and alert you to suspicious charges, or to a possible data breach in an organisation you deal with, then automatically cancel your compromised card and send you a new one."



Quote for the day:


"You are never too old to set another goal or to dream a new dream." -- C.S. Lewis


April 02, 2016

Five Technologies That Will Disrupt Healthcare By 2020

AI is consistently improving the approach and access to reliable and accurate medical image analysis with help from digital image processing, pattern recognition and machine-learning AI platforms. ... Innovative, automated patient guidance and engagement solutions, such as AI-enabled medication adherence to observe patient devotion by using advanced facial recognition and motion-sensing software, have started to automate one of the major healthcare processes of directly observed therapy (DOT). New entrants with similar solutions are expected to rapidly capture this sub-segment of the market.


Which country is most prepared for tech disruption?

While less than half of those surveyed felt their education was boring or old fashioned, young people were twice as likely to say so. Confidence in entering the workplace was again a feeling shared mostly among those in middle-income economies. ... The need for so-called "soft skills" was, in the minds of many, the most crucial aspect of the modern workplace. Skills such as communications, relationship-building and problem-solving were prioritized between 86% (Australia) and 79% (Brazil), compared with academic achievement, which scored only between 50% (South Africa) and 36% (Germany). Employers expectations, as perceived by those surveyed, were also focused on soft skills. While technical skills were important, time management, people management and active learning were all considered to be either more important or of equal importance.


Are healthcare CIOs being cut out of the analytics loop?

“The best organizations are taking more of a dyad approach,” Weaver observes. “The operator and the technologist are both at the table, having that conversation, so you’ve got the right technology support to support the operator. A lot of times, the operator may be running the analytic shop. But one of the things we’ve found is that while the CIO may not be running the analytics shop, the CIO is a critical partner. Because to do the analytics, you have to both collect the data and then pull it out of the operational data warehouse and put it into an analytic capability to be able to analyze it.”  What happens in organizations where the analysts report to the operators and the CIO doesn’t have input? “Those places that have gone to the operator model find that begins to break if they don’t keep a consistent relationship with the technology folks,” he responds.


How Technology is Transforming Women-Owned Businesses in Africa

Technology is transforming the lives of women business owners in Africa as they are playing a significant role in the creation of jobs in their communities. Also, technology incubators dedicated to supporting entrepreneurs continue to populate the continent, and with increased access to the internet, entrepreneurs in emerging economies will continue to utilize various technological tools and resources to start, expand, and grow their businesses. Nigeria, in particular, leads the way in the number of women entrepreneurs that have developed. But, what else can be done to ensure that women are not just users of technological tools but also creators of them? How can we work to engage and increase accessibility in rural areas of the continent?


Is HyperContainer the Answer for Cloud Native Applications?

In a HyperContainer, the application process is still able to access what it needs: kernel and data. The difference is that the container does not run on the host kernel. Instead, every container gets its own, independent, guest kernel. By doing this, the application running inside is perfectly isolated from both other containers and the host. Performance wise, with the assistance of the super tiny guest kernel, a HyperContainer is able to finish booting in milliseconds (100-150ms), which is dramatically faster than a VM. Some may argue that this speed still lags behind a Linux container, but consider that an application usually takes longer to get started anyway meaning that, in practice, there is simply no difference.


The IT skills gap is a reality, but doesn’t have to be

Despite the popular conversation around big data in the business world, in 2014, the report notes that there was a decrease in the pay for these skills. According to the report, this can be attributed to the unrealistic expectations of business leaders, who reported being unsatisfied with the ROI on analytics and analytics professionals. Foote says that business leaders needed to temper their expectations around what big data and analytics could do for the business over time. And the attitude might have already started to shift, considering that as of 2015, the data shows that the market value of 74 noncertified and certified big data skills increased by six percent over the span of 12 months. One of the barrier around effective big data strategies at companies is about getting "decision makers to be more comfortable with data-driven decision making," according to the report.


Build this Raspberry Pi guardian robot and stave off intrusions!

Younger siblings -- gross! They sneak into your room and grime up your stuff. Sometimes you might also feel that way about your spouse. Babe, get your greasy mitts off my sunglasses. What you need is a sentinel, a guardian, a robot defender. This latest project comes to ZDNet via Dexter Industries, which makes cool components for DIY robotics builds. I have no affiliation to Dexter, but I dig what they do and I'm happy they've brought us a new build. Build and program this little GoPiGo to protect your wardrobe, your closet, or your whole room. Hide GoPiGo behind a closed door and when the door is opened it will attack, scaring intruders and snapping a picture as proof that your inner sanctum has been violated.


Why You Shouldn’t Enable “FIPS-compliant” Encryption on Windows

This setting does two things to Windows itself. It forces Windows and Windows services to use only FIPS-validated cryptography. For example, the Schannel service built into Windows won’t work with older SSL 2.0 and 3.0 protocols, and will require at least TLS 1.0 instead. Microsoft’s .NET framework will also block access to algorithms that aren’t FIPS-validated. The .NET framework offers several different algorithms for most cryptography algorithms, and not all of them have even been submitted for validation. As an example, Microsoft notes that there are three different versions of the SHA256 hashing algorithm in the .NET framework. The fastest one hasn’t been submitted for validation, but should be just as secure. So enabling FIPS mode will either break .NET applications that use the more efficient algorithm or force them to use the less efficient algorithm and be slower.


Is Artificial Intelligence Really Dangerous?

Ever since the beginning of time, we humans have had a desire for technological advancements and innovation. Through our vivid imaginations, we have been able to develop technologies that previously seemed impossible were just a part of our science fiction fantasies. Virtual reality, space tourism, self-driving cars and the much talked about artificial intelligence. Some of the most talented innovators have blurred the lines between fantasy and fiction for us. Artificial intelligence is now a very real prospect that companies are focusing on. Now, for those of you who are still new to this concept, Artificial intelligence is a field of science which focuses on how hardware and software components of a machine can exhibit intelligent behaviour. Instead of being fed information from the user himself, they learn over the course of time and become more intelligent.


How the New JSON Support Will Work in SQL Server 2016

"Someone might say -- this will not be fast enough, but we will see," Popovic said. "Built-in JSON parser is the fastest way to process JSON in database layer. You might use CLR type or CLR parsers as external assemblies, but this will not be better than the native code that parses JSON." Popovic said the JSON functionality will be rolled out over time in the SQL Server 2016 previews. SQL Server 2016 CTP2 is planned to include the ability to format and export data as JSON string, while SQL server 2016 CTP3 is expected to incorporate the ability to load JSON text in tables, extract values from JSON text, index properties in JSON text stored in columns, and more, he said. The SQL Server team will be publishing more details about the huge new release of SQL Server 2016 as the days count down to the first public preview, expected this summer.



Quote for the day:


“What high-performing companies should...create: A great place for great people to do great work.” -- Marilyn Carlson


March 31, 2016

Full Stack Testing: Balancing Unit and End-to-End Tests

At their core, tests make sure your application is doing what you intend it to do. They are an automated script to execute your code and check that it did what you expected. The better they are, the more you can rely on them to gate your deployments. Where your tests are weak, you either need a QA team or you ship buggy software (both mean your users get value at a much slower pace than is ideal). Where your tests are strong, you can ship confidently and quickly, without approvals or slow, manual processes like QA. You must also balance the future maintainability of the tests you write. Your application will change and thus so will your tests. Ideally, your tests only have to change proportionally to the change you are making in your software. If you are making a change in an error message, you don’t want to have to rewrite a lot of your test suite. 


From Role-Based Access Control to Access Governance

Because the organization is fluid (e.g. reorganizations, mergers, etc.), the composition of the attributes (the payroll system) is in a constant state of change. The network landscape is also subject to change. And this means that the model that was set up has to be reviewed regularly. Validating the RBAC model is also known as re-certification. Re-certification checks whether the authorizations a person receives on the basis of his attributes are still appropriate within the organization. Alongside validating the RBAC model that has been set up, part of access governance is also to test the reality. This is called attestation. In attestation the organization itself is asked whether the assignment of certain authorizations to employees is in fact correct.


Coursera Announces First MOOC-Based Master’s Degree in Data Science

Data science has quickly become one of the most sought-after and highest-paid professionsin the United States, yet few highly ranked master’s programs exist today that are developed specifically for training data scientists, and none offer the scale of an open online course platform. The MCS-DS degree taps a whole new demographic of potential data scientists who are unable to take a traditional education path by reimagining graduate-level education as a “stackable” degree. Unlike other master’s degrees, students can test the waters of the MCS-DS degree with a shorter Specialization certificate program in data mining or cloud computing, earning a meaningful credential that can then fully transfer to the MCS-DS if they later decide that they want the full degree.


10 Ways Virtual Reality is Disrupting Industries

The concept of remodeling isn’t just limited to education or world history. It is creating ripples in the medical world as well. For quite some time now, Virtual Reality is being used to treat Posttraumatic Stress Disorder (PTSD) in war veterans. Using VR therapists recreate situations which the patient fears while they are still in a safe environment. Commonly known as exposure therapy, this helps soldiers in dealing with the stress endured on the during real-world war situations. USC’s Institute for Creative Technologies has been remodeling sites of Iraq and Afghanistan in virtual reality to help warriors combat PTSD. Another healing application of VR in medical is helping amputees deal with phantom pain by recreating their limbs.


Why Hospitals Are the Perfect Targets for Ransomware

The payoff for hackers can be huge. The FBI estimated in 2014 that the extortionists behind the CryptoLocker strain of ransomware swindled some $27 million in just six months out of people whose data they took hostage. And ransomware attackers have upped the ante in recent months with attacks that encrypt not just files on an individual computer but on core servers, to prevent an entire organization from accessing shared files and databases. ... “You don’t have to lock an entire network,” Sjouwerman says. “You just need to find where are the critical files in a network—what servers are serving up the millions of files that most workers use…. And you only need to lock maybe two or three file servers to essentially block the whole network.”


IBM Data Chief on Strategy: Training Engineers for Cognitive Systems

Data is playing an ever-growing role in the business world, with machine learning software and artificial intelligence systems like IBM’s Watson leading the way. IBM’s Bhandari says that IBM is focused on training more data scientists and engineers in analytics systems, such as open-source computing framework Apache Spark, because it believes the amount of human talent has not kept pace with advances in analytics. Simply put, there are not enough people who can take action on insight that is provided by today’s data-analytics software, like the video footage of the Magic-Heat games did for the in-game stats, he says. IBM’s corporate strategy in the current market is on cognitive systems, such as Watson, Bhandari says.


Senator Wyden Lays Out New 'Compact For Privacy & Security In The Digital Age'

Here’s the problem. A few decades ago, courts began ruling that if you provide information to a third party, like your bank or your phone company, you are no longer keeping it private, and it is no longer protected under the Fourth Amendment to the Constitution.  There is a huge, glaring problem with that logic. When you share your information with a single private company, that is not the same thing as making it public. Your phone company may have records of who you call, and your bank may have records of how you spend your money, but your contract with them will have rules for when and how they are allowed to share that information. They are not allowed to just disclose it freely.  This is true in the digital world as well. When I post a handsome new profile picture on Facebook, or send out a tweet to tell people that I’m holding a town hall in Oregon,


Enterprise Mobility is Going Beyond “Mobile First” Approach. Are You Ready?

The future is likely to become even more connected, thanks to internet of things and M2M (machine-to-machine) communications. This means, businesses now need to go beyond ‘mobile first’ planning. By this we mean you need to develop a strategy that puts your business at the forefront of mobility. You need to go beyond just creating mobile applications and services when it comes to deploying mobile technologies. While these efforts were tactical enough to address the need for people to remain connected 24*7 across various devices, they won’t suffice to make your business ready for the mobile journey of the future. Today, we see more and more businesses are investing resources to create a mobile strategy that can successfully transform the enterprise, changing the way they run their business.


5 Dev Tools For Better Code Security

Information security is of paramount importance these days, and there is no better place to start securing systems and data than in the software development process itself. Lapses in coding can leave systems vulnerable to attackers. But examining thousands and thousands of lines of code for a wide array of potential weaknesses is no easy task. Thankfully, a variety of tools are emerging to help ensure the security of your code. With the help of capabilities such as static analysis, these tools not only flag possible issues but enforce security a priority in the development process. Following are five tools aimed at analyzing your code for security flaws, ranging from open source to commercial offerings, available as on-premises solutions or services in the cloud.


Why CISOs Need to Build Better Business Cases For Data Security

The overall budget for security-related costs is often within decentralized healthcare organizations and resides with a number of different clinical, business and technology areas. Typically, the easy business case to make for security investments comes from improving the organization’s overall security posture. However, CISOs will have to redesign this undemanding path toward an approach for making business cases in terms executives can appreciate and directly connect to the organization’s top strategy goals and objectives. Making more effective business cases can help to gain investment dollars and increased control for a budget not always under a CISO’s direct management.


Quote for the day:


"There are many elements to a campaign. Leadership is number one. Everything else is number two." -- Bertolt Brecht


March 30, 2016

Cyber criminals use Microsoft PowerShell in ransomware attacks

Traditional ransomware variants typically install malicious files on the system which, in some instances, can be easier to detect. Although the code is simple, PowerWare is a novel approach to ransomware, the researchers said, reflecting a growing trend of malware authors thinking outside the box in delivering ransomware. Carbon Black researchers found that PowerWare is delivered through a macro-enabled Microsoft Word document that launches two instances of PowerShell. One instance downloads the ransomware script and the other takes the script as input to run the malicious code to encrypt files on the target system and demand payment for releasing them.


Train your IT team for endurance

Work is the ultimate endurance event. While a triathlete might compete in a 5- to 12-hour event, the average career is measured in decades. Consider your IT organization for a moment. If it's like the majority, it's been conditioned around sprinting. A firefight or development sprint results in a fury of activity, the organizational equivalent of an athlete spiking her heartbeat to the max and tenaciously hanging there until it's physically impossible to sustain that level of effort. Like the athlete, after the sprint the team usually hits a wall and performance crashes down— employees even become physically affected by the workload. Contrast this to the team that has trained and measured around the productivity they can produce at sustainable activity levels. There's a quiet energy and diligence, and this team can make a strategic sprint or two when the time comes, without depleting themselves and falling apart.


Q&A: Database infrastructure must match modern apps

As a standard SQL solution, the way you build an application is not significantly different from how you build a system against other relational database management systems. The difference is that it scales. If you're running Oracle on a single machine, and you reach the capacity of a SQL machine, you switch to Oracle RAC, and that gets you some more performance. But when that gets exhausted, you're done. With NuoDB, you can take an intuitive database application design, and rather than changing the application to handle more scalability, you just plug in more computers.


Is outsourcing IT worth the compliance risk?

“Regulators have taken a deeper interest in outsourcing services that have an impact on either the regulatory posture of the organization or on cyber security and cyber-crime,” explains Bala Pandalangat, president and CEO of Centre for Outsourcing Research & Education (CORE), an organization that provides outsourcing advice and training based in Toronto. CORE’s membership includes Deloitte, IBM, Xerox, large banks, universities and law firms such as Torys LLP. “We see several common mistakes when it comes to outsourcing arrangements,” says Pandalangat. “The number one mistake is viewing risk management is an after-thought. Many deals emphasize the financial benefit of outsourcing at the expense of risk management. If risk management is not built into the contract, costly adjustments may be required to address that concern.”


NASA Software Audit Reveals Budgetary Black Hole

The audit warns that delays with such software designed for the Space Launch System (SLS) rocket could affect the ability to react to unexpected issues during launch operations, and could impact the launch schedule for the unmanned Orion system, which is due to lift off in 2018. The first exploration mission would allow the space agency to use the lunar vicinity as a proving ground to test technologies farther from Earth, and demonstrate it can get to a stable orbit in the area of space near the moon in order to support sending humans to deep space. The root of the budgetary issues appears to result from NASA's June 2006 decision to integrate multiple products or parts of products rather than develop software in-house or buy an off-the-shelf product.


Apple’s New Challenge: Learning How the U.S. Cracked Its iPhone

The challenges start with the lack of information about the method that the law enforcement authorities, with the aid of a third party, used to break into the iPhone of Syed Rizwan Farook, an attacker in the San Bernardino rampage last year. Federal officials have refused to identify the person, or organization, who helped crack the device, and have declined to specify the procedure used to open the iPhone. ... Making matters trickier, Apple’s security operation has been in flux. The operation was reorganized late last year. A manager who had been responsible for handling most of the government’s data extraction requests left the team to work in a different part of the company, according to four current and former Apple employees, who spoke on the condition of anonymity because they were not authorized to speak publicly about the changes.


Prep your smartphone for emergency situations

Another obvious recommendation, but one that can save you a lot of grief: keep your device in tip-top shape. Remove all unnecessary apps which might drain the battery. Keep a couple of spare batteries (if your device allows you the option of swapping these out). Make sure the hardware performs well; replace damaged screens, buttons and other elements which may be malfunctioning. And by all means keep it as fully charged as possible. I use car chargers, desk chargers and of course a bedside charger so at least two-thirds of the time during a normal day (and sometimes 100% depending on my schedule) I have access to power.


The triumphant, magnificent, and unexpected return of PC gaming

What makes the PC even more compelling right now is that the VR revolution has finally started. Just this week, the Oculus Rift debuted for PC with a host of new games that you can’t play on any of the consoles. (I will have a full report on that device soon.) That system requires at least an Intel Core i5 processor, 8GB of RAM, and at least a NVIDIA GTX 970 or AMD 290 GPU. The consoles just don’t have enough horsepower to make VR look realistic or compelling, despite what you may have heard. My theory is that PC gamers are smart enough to know this. They’ve seen the writing on the wall, and it says Virtual Reality


IT Security Threat to Intensify in Next Two Years

The report, Threat Horizons 2018, says the ability of organizations to protect IT is progressively being weakened. Businesses and society, for that matter, are becoming more reliant on complex new technologies to function, which intensifies the threat landscape, the report contends. "We are having to be a little bit more, perhaps, critical of the way in which we look at our use of technology, and that's what you're beginning to see with some of the predictions we're coming out with now," Steve Durbin, managing director of the Information Security Forum, says in an interview with Information Security Media Group. "Let's bear in mind: These predictions are really trying to put some extra weaponry into the armory for the security professionals so we can anticipate some of the challenges that we're going to be seeing."



Quote for the day:


"Strategy is a commodity, execution is an art." -- Peter Drucker


March 29, 2016

How mobile browser is making a comeback and challenging apps

India has 1 billion mobile phone users. Almost 90 per cent users have a phone that costs below Rs 8,000. These have low memory and slow processors. But most apps are heavy—more than 5 MB and often exceeding 8 MB. Some of the furniture apps are 30 MB in size. Computing resources to download and run apps is limited on low end phones. Top end phones that can accommodate these apps cost a bomb. Browsers have no such problems. They offer content and functionalities across categories. ... "The cost of developing a browser site is one-third of an app. Besides, chance of an app malfunctioning or crashing is higher than that of a mobile site."


Invokedynamic - Java’s Secret Weapon

The features main goal was to create a bytecode to handle a new type of method dispatch - that essentially allows application-level code to determine which method a call will execute, and to do so only when the call is about to execute. This allows language and framework writers to support much more dynamic programming styles than the Java platform previously provided. The intent is that user code determines dispatch at runtime using the method handles API whilst not suffering the performance penalties and security problems associated with reflection. In fact, the stated aim of invokedynamic is to be as fast as regular method dispatch (invokevirtual) once the feature has matured sufficiently.


How to Review and Test Backup Procedures to Ensure Data Restoration

It’s important to test often enough as well as to test in a quality sort of fashion. But how often is often enough? What is and is not quality testing? “The factors that should affect how often you test backup and restore capabilities fall under Governance, Risk, and Compliance (GRC) and include regulatory constraints, data retention periods / data criticality, risk assessment, policy, audit preparation, and strategic planning,” says Adam Gordon, CSO, New Horizons Computer Learning Centers Of South Florida. Testing frequency realities are another matter as some companies only find out whether backups work when they need them, and the success or failure of the backups and the restore operation in the middle of a crisis is the only test of their adequacy. This is certainly not often enough.


Banks and fintech firms can and must collaborate

"We recognise API as an unstoppable force," Mr Mohanty, a former Citibank banker, said. “There's no other way to do innovation. If (banks) don't do it, I don't know how they will survive.” He added that countries such as the United Kingdom and Japan have mapped out policies in relation to API, and the MAS is keen to “partner with industry players to make it work” in Singapore. However, Mr Mohanty noted that there’s a gap in terms of how much regulation can drive change, and businesses will ultimately have to take the lead. Ong Whee Teck, partner of Technology Consulting at PricewaterhouseCoopers, agreed: "The days are here to collaborate, otherwise fintech is here to eat your lunch. Change will require a grassroots-style uprising."


For IT, climate change means preparing for disaster

Interest in disaster recovery planning increased after the 9/11 terrorist attacks, but "many pulled back because of the cost of maintaining two centers," and paying for idle equipment, said Phil Goodwin, a research director at IDC. Cloud-based services are changing that. The fastest growing segment of disaster recovery is "disaster recovery as a service," said Goodwin. There may be 150 or more firms providing disaster recovery as a service (DRaaS). Taco, Inc., an HVAC manufacturing company in Rhode Island, maintains servers in a back-up facility run by a disaster services provider. But by the end of this year, the company hopes to complete a move to a disaster recovery as a service provider.


Benefits and Risks of Knowledge Process Outsourcing

If you are a business owner, you already know that there is no endeavour without risk. Risk is omnipresent. It needs to be identified, assessed and mitigated with a proper plan always. The risks of KPO entail key talent retention. Internal information could get lost if KPO staff is working remotely. The service providing individual might not match the company culture or there are communication difficulties. KPO is usually very time-consuming and there is often no immediate result. Depending on the nature of your business there might be more or less risks involved in working with a KPO company, but these risks are very transparent, they can be accounted for and there can be an operational design, which allows for an efficient cooperation for the benefit of all involved parties and individuals.


Linux at 25: Why It Flourished While Others Fizzled

It’s all the more remarkable, then, that Linux, which celebrates its 25th birthday later this year, has so profoundly challenged the norms of software development. It showed programmers everywhere that a different world was possible—a world where they could share code openly, collaborate informally, and make a decent living, even if they gave away the chief product of their labor for free. The advantages of working this way have since become obvious to even the most hard-headed of business leaders, with most large software-development companies now sharing at least some of the fruits of their programmers’ efforts openly. How did Linux end up producing such radical change? And why did other free-software activists’ attempts to build bigger and seemingly better systems than Linux fail to achieve as much momentum?


Autonomic platforms

Over time, IT departments became saddled with manual processes, cumbersome one-size-fits-all software development lifecycle (SDLC) methodologies. Or they developed “over-the-wall engineering” mind-sets in which individuals fulfill their own obligations with little understanding or concern about the needs of downstream teams. This operational baggage has fueled tension between IT’s development group, which pushes for speed and experimentation with new features and tools, and its operations organization, which prizes stability, performance, and predictable maintenance. To combat organizational inefficiency as well as any discord that has arisen among various parts of the IT value chain, many organizations are implementing DevOps a new way of organizing and focusing various teams.


Petya Ransomware Overwrites MBRs, Locking Users Out of Their Computers

It's hard enough for non-technical users to deal with ransomware infections: understanding public-key cryptography, connecting to the Tor anonymity network and paying with Bitcoin cryptocurrency. A new malicious program now makes it even more difficult by completely locking victims out of their computers. The new Petya ransomware overwrites the master boot record (MBR) of the affected PCs, leaving their operating systems in an unbootable state, researchers from antivirus firm Trend Micro said in a blog post. The MBR is the code stored in the first sectors of a hard disk drive. It contains information about the disk's partitions and launches the operating system's boot loader. Without a proper MBR, the computer doesn't know which partitions contain an OS and how to start it.


High Load Trading Transaction Processing with Reveno CQRS/Event Sourcing Framework

Reveno is a new JVM based lock-free transaction processing framework based on CQRS and event-sourcing patterns. Although it’s a simple and powerful tool it does not compromise on performance. All transactions are persisted to read-only journals, and the latest state of the domain model can be restored by simply replaying these events in sequence. All runtime operations are performed in-memory so throughput can reach an order of millions of transactions per second, and mean latency in the order of microseconds. But with all of this power Reveno is still a general purpose framework, as it covers a variety of use cases with rich sets of engine configurations. For example, you can vary the durability configuration, from very relaxed



Quote for the day:


"A single day is enough to make us a little larger or, another time, a little smaller." -- Paul Klee